preview

HIPAA Chapter 8 Summary

Decent Essays

In chapter 8 I learned that HIPAA is rules for collection, use and disclosure and personal health information. It Applies to all health information custodians (HICs) in Ontario and to those who receive PHI from HICs. However, it further excludes organizations that are not HICs. For example, employers and insurance companies that receive data from individuals. In all but few cases, HICs have to obtain consent to collect, use and/ or disclosure PHI. It further allows for people to access and request the correction of their PHI. Consumers are allowed permissions on whether health information can be used or shared for certain purposes, such as for marketing. They are allowed to get reports on when and why health information was shared for certain …show more content…

Some include administrative, physical and technical safeguards. In administrative safeguards it allows the reader to understand the security management process to reduce risk and vulnerabilities. Security personnel responsible for developing and implementing security policies. Information access management minimum access to perform duties. Physical safeguard is about the limit of physical access to facilities, and how workstation and device security policies and procedure covering transfer, removal, disposal, and reuse of electronic media. Finally, technical safeguard is about the access control that restricts access to authorized personnel’s. Audit controls for hardware, software, and transitions. Integrity controls to ensure data is not altered or destroyed. Transmissions security to protect against un authorized access to data transmitted on network and via email. Moreover, there are three pillars of data security confidentiality, availability, and integrity. Confidentiality refers to the prevention of data loss, and is the category most easily identified with HIPAA privacy and security within healthcare environments. Usernames, passwords, and encryption are common measures implemented to ensure confidentiality. Availability refers to system and network accessibility, and often focuses on power loss or network connectivity outages. Integrity describes the trustworthiness and permanence of data, an assurance that the lab results or personal medical history of a patient is not modifiable by unauthorized entities or corrupted by a poorly designed process. Database best practices, data loss solutions, and data backup and archival tools are implemented to prevent data manipulation, corruption, or loss; thereby maintaining the integrity of patient

Get Access